"The Evolution of Cyber Security: AI and Cloud Technologies Take the Lead"
Keywords:
Cybersecurity, Artificial Intelligence (AI), Cloud Computing, Threat Detection, Security Automation.Abstract
The landscape of cybersecurity has evolved significantly over the past few decades. From traditional antivirus and firewall protection to the integration of advanced artificial intelligence (AI) and cloud technologies, the field of cybersecurity is undergoing a radical transformation. Cloud technologies provide scalability, flexibility, and global reach, while AI is enhancing threat detection, response, and prevention. This paper explores the evolution of cybersecurity, focusing on how AI and cloud technologies are becoming central to modern security solutions. It discusses the benefits, challenges, and future implications of this evolution, with a particular emphasis on the growing intersection of AI and cloud-based security systems.
Downloads
References
M. Shafiq, P. K. K. R. T. J., & A. H. G. (2021). Cloud Computing and Cybersecurity: A Comprehensive Review. Journal of Cyber Security Technology, 1(3), 12–35.
A. Shamsuddin, M. K. K. (2020). Artificial Intelligence for Cybersecurity: A Survey. International Journal of Computer Applications, 180(5), 25–31.
G. Z. Z. S. J. (2019). Machine Learning Techniques for Cybersecurity. IEEE Transactions on Network and Service Management, 6(3), 22–37.
S. K. V. R. M. (2019). Cybersecurity and Artificial Intelligence: Trends and Challenges. Journal of Cyber Security, 15(2), 14–29.
P. N. S. M. (2021). AI and Cloud Technologies in Security: Review and Implications. Journal of Cloud Computing: Advances, Systems and Applications, 8(4), 125–139.
Y. S. N. T. A. (2020). Cloud Computing Security Issues and Challenges: A Survey. International Journal of Cloud Computing and Services Science, 4(2), 101–115.
B. H. M. (2020). Detecting and Preventing Security Threats in Cloud Computing Using AI-Based Techniques. Cybersecurity 7(2), 101–115.
B. G. G. T. (2018). Applying Artificial Intelligence in Cloud Security. IEEE Cloud Computing, 5(3), 22–29.
L. H. R. S. (2019). The Role of Cloud Computing in Cybersecurity: Trends and Future Directions. Computers & Security, 82, 73–88.
F. Z. W. M. (2020). Artificial Intelligence in Cloud Security: Challenges and Future Prospects. Information Systems Frontiers, 22(4), 755–769.
N. H. A. P. (2020). An Overview of AI-Powered Security Solutions. Cloud Computing Journal, 5(2), 45–53.
L. G. Z. B. (2020). The Impact of Cloud Computing on Cybersecurity Solutions. International Journal of Computer Science and Network Security, 18(3), 220–227.
D. W. A. H. (2021). AI-based Detection Systems for Cyber Threats. Cybersecurity Engineering Journal, 29(1), 12–25.
E. J. L. S. (2019). Artificial Intelligence and Cloud Technologies for Cybersecurity Automation. Journal of Network and Systems Management, 27(2), 324–342.
C. M. F. J. (2020). AI-based Anomaly Detection in Network Traffic for Cloud Security. International Journal of Network Security, 22(6), 789–801.
R. H. G. K. (2021). Predictive Security Analysis Using Machine Learning in Cloud Environments. Journal of Cloud Security, 4(2), 68–84.
J. M. A. P. (2020). Leveraging Cloud Security Tools with AI for Threat Management. Journal of Cloud Computing and Applications, 9(4), 99–115.
A. P. M. D. (2019). Cloud Security and Artificial Intelligence: Prospects and Challenges. Cyber Defense Review, 10(5), 15–30.
M. M. P. R. (2019). A Comparative Review of Cybersecurity Tools for Cloud Infrastructure. International Journal of Cybersecurity, 19(7), 1023–1041.
H. S. V. W. (2020). Enhancing Cloud Security with AI and Machine Learning. Computational Intelligence in Cybersecurity, 25(3), 15–32.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.